Use of network and cyber security tools to counter the security obstacles

Network security cryptography firewall Wireless networks BYOD Cyber Security

Authors

  • Dr.Kamalakannan Machap
    dr.kamalakannan@staffemail.apu.edu.my
    School of Technology Asia Pacific University of Technology and innovation (APU) Kuala Lumpur, Malaysia
  • Abulla Muaza School of Technology Asia Pacific University of Technology and innovation (APU) Kuala Lumpur, Malaysia
Vol. 6 No. 1 (2022)
Original Research
January 16, 2026

Downloads

In this study we have discovered the issues of challenges in networking and cyber security, where everything is dependent on the latest technology, and the most significant feature of technology is the network. It is critical to limit the risk of threats to create a stable and reliable network environment for users. According to certain surveys, most security vulnerabilities are caused by "insider risks." That is, the hazards that arise within companies are greater than the threats that arise externally. There are numerous tools and strategies that can be utilized in a network environment to address security issues and challenges. Although security risks and obstacles can be mitigated with the use of these tools and strategies, it is difficult to make a network completely threat-free. The fundamental cause for this is the rapid advancement of technology and the increasing use of it. According to surveys, security concerns are increasing day by day because of rapid technological change and the growing number of devices connected around the world. Attackers are continuously coming up with new ways to get around the security protections built into devices and networks. Several security technologies and strategies could be utilized in a network to address or lessen these security difficulties and obstacles. Some are software tools, while others are physical tools.